Palo Alto 3200 Series – Firewalls For Data Center – PA-3200 Series

Palo Alto 3200 Specifications:

  • Manufacturer: Palo Alto
  • Brand: Palo Alto Networks
  • Product Line: Palo Alto Networks
  • Model: PA-3200 series
  • Safely enable applications.
  • users and content at high throughput speeds and secure encrypted traffic without slowing down your business or compromising privacy.

Palo Alto-3200 Series Datasheet – Download PDF

 

 

Description

Palo Alto 3200 Specifications:

  • Manufacturer: Palo Alto
  • Brand: Palo Alto Networks
  • Product Line: Palo Alto Networks
  • Model: PA-3200 series

Interface Modes

  • L2, L3, tap, virtual wire (transparent mode)

Routing

  • OSPFv2/v3 with graceful restart, BGP with graceful restart, RIP, static routing
  • Policy-based forwarding
  • Point-to-point protocol over Ethernet (PPPoE)
  • Multicast: PIM-SM, PIM-SSM, IGMP v1, v2 and v3

SD-WAN

  • Path quality measurement (jitter, packet loss, latency)
  • Initial path selection (PBF)
  • Dynamic path change

IPv6

  • L2, L3,tap, virtual Wire (transparent mode)
  • Features: App-ID™, User-ID™, Content-ID™, WildFire® and SSL decryption
  • SLAAC

IPsec VPN

  • Key exchange: manual key, IKEv1 and IKEv2 (pre-shared key,certificate-based authentication)
  • Encryption: 3DES, AES (128-bit, 192-bit, 256-bit)
  • Authentication: MD5, SHA-1, SHA-256, SHA-384, SHA-512

VLANs

  • 802.1q VLAN tags per device/per interface: 4,094/4,094
  • Aggregate interfaces (802.3ad), LACP

Network Address Translation

  • NAT modes (IPv4): static IP, dynamic IP, dynamic IP and port (port address translation)
  • NAT64, NPTv6

Additional NAT features:

  • dynamic IP reservation, tunable dynamic
  • IP and port oversubscription

High Availability

  • Modes: active/active, active/passive
  • Failure detection: path monitoring, interface monitoring

 

Palo Alto 3200 Series Security Features:

Classifies all applications, on all ports, all the time

  • Identifies the application, regardless of port, encryp[1]tion (SSL or SSH) or evasive technique employed.
  • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping.
  • Categorizes unidentified applications for policy control, threat forensics or App-ID™ technology development

Enforces security policies for any user, at any location

  • Deploys consistent policies to local and remote users running on Windows®, Mac® OS X®, macOS®, Linux, Android®, or Apple® iOS platforms.
  • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell®eDirectory™ and Citrix®.
  • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions and any other source of user identity information.

Prevents known and unknown threats

  • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed.
  • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing.
  • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then
  • automatically creates and delivers protection

Palo Alto 3200 Series Datasheet – Download PDF